A Method for Protecting Access Pattern in Outsourced Data

Authors

Abstract

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses must also be ensured. This is because by observing users' queries, attackers can extract the relationships between the queries and obtain a knowledge of the database to decrypt details of the database structure. In this paper, for the outsourcing model, the storing methods that are appropriate for providing confidentiality and protecting the access pattern are described. Finally, a segmentation-based approach is presented to protect the access pattern for outsourced data. Compared to previous methods, experiment results indicate our proposed method provides an acceptable level of preventing the information disclosure as well as not imposing large overhead of storing, computation, and communication.

Keywords


  1. [1] Salinas D., Basnight M., Morris, D., “Providing a database as a service in a multi-tenant environment”, U.S. Patent Application No 16/113,591, 2019. [2] Wei, X., Minghao Z., Qiuliang X. "Efficient and secure outsourced approximate pattern matching protocol", Soft Computing, Vol. 22, No. 4, 2018. [3] Kanwal T., Abdul Jabbar A., Anjum A., Malik S., "Privacy-aware relationship semantics–based XACML access control model for electronic health records in hybrid cloud.", International Journal of Distributed Sensor Networks, Vol.15, No. 6, 2019. [4] Amalarethinam G., Rajakumari S., "A Survey on Security Challenges in Cloud Computing", Journal of Physical Sciences, Vol. 24, No. 1, 2019. [5] Kellaris, G., "Generic attacks on secure outsourced databases", Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2016. [6] Tang, J., "Ensuring security and privacy preservation for cloud data services", ACM Computing Surveys, Vol. 49, No. 1, 2016. [7] Xiao, Yinhao, "Edge Computing Security: State of the Art and Challenges." Proceedings of the IEEE, 2019. [8] Aggarwal, G., "Two can keep a secret: A distributed architecture for secure database services", CIDR, 2005. [9] Di, V., Sabrina, D., "Distributed shuffling for preserving access confidentiality", European Symposium on Research in Computer Security, Berlin, 2013. [10] Dou, Y., Chan, H. C., "Access Pattern Hidden Query over Encrypted Data through Multi-Clouds", In IEEE Global Communications Conference (pp. 1-6), 2017. [11] Kumekawa, J. K., "Health information privacy protection: crisis or common sense", Online Journal of Issues in Nursing, Vol. 6, No. 3, 2001.‏ [12] Bodenreider, O., "Comparing SNOMED CT and the NCI Thesaurus through Semantic Web Technologies", 3rd international conference on Knowledge Representation in Medicine, 2008. [13] Rahim, N., Ahmad, J., Muhammad, K., Sangaiah, A. K., Baik, S. W., "Privacy-preserving image retrieval for mobile devices with deep features on the cloud", Computer Communications, Vol. 127, P. 75-85, 2018.